Abstract is missing.
- Fault tolerance for fight-through: a basis for strategic survivalKevin A. Kwiat. 1-2 [doi]
- Rethinking cyber securityVijay Varadharajan. 3-4 [doi]
- Collusion resistant fingerprinting of digital audioAndrew Z. Tirkel, Thomas E. Hall, Charles F. Osborne, Nicholas Meinhold, Oscar Moreno. 5-12 [doi]
- Using decision trees for generating adaptive SPIT signaturesMohamed Nassar, Sylvain Martin, Guy Leduc, Olivier Festor. 13-20 [doi]
- Cryptanalysis of the stream cipher BEANMartin Ågren, Martin Hell. 21-28 [doi]
- Corporate networks security evaluation based on attack graphsEvgeny Sergeevich Abramov, Artem Viktorovich Andreev, Denis Valerievich Mordvin, Oleg B. Makarevich. 29-36 [doi]
- Echo hiding based stereo audio watermarking against pitch-scaling attacksIynkaran Natgunanathan, Yong Xiang. 37-42 [doi]
- The optimal linear multi-secret sharing scheme for non-threshold access structure(student contribution)Shu-guang Dai, Chun-ming Tang, Yue-nai Chen. 43-48 [doi]
- Rational distance-bounding protocols over noisy channelLong Hoang Nguyen. 49-56 [doi]
- Algebraic analysis of GOST encryption algorithmLudmila K. Babenko, Evgeniya Ishchukova, Ekaterina Maro. 57-62 [doi]
- Fault attack to the elliptic curve digital signature algorithm with multiple bit faultsAlessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Gerardo Pelosi, Andrea Palomba. 63-72 [doi]
- Trust based fusion over noisy channels through anomaly detection in cognitive radio networksShameek Bhattacharjee, Saptarshi Debroy, Mainak Chatterjee, Kevin A. Kwiat. 73-80 [doi]
- On automatic detection of SQL injection attacks by the feature extraction of the single characterMichio Sonoda, Takeshi Matsuda, Daiki Koizumi, Shigeichi Hirasawa. 81-86 [doi]
- Logic based authorization program and its implementationChun Ruan, Seyed A. Shahrestani. 87-94 [doi]
- Security analysis of a femtocell deviceRavishankar Borgaonkar, Kevin Redon, Jean-Pierre Seifert. 95-102 [doi]
- A model-based attack injection approach for security validationAnderson Nunes Paiva Morais, Ana R. Cavalli, Eliane Martins. 103-110 [doi]
- Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocolFerdous A. Barbhuiya, Santosh Biswas, Sukumar Nandi. 111-118 [doi]
- Counteracting DDoS attacks in WLANUdaya Kiran Tupakula, Vijay Varadharajan, Sunil Kumar Vuppala. 119-126 [doi]
- A secure and anonymous cooperative sensing protocol for cognitive radio networksHelena Rifà-Pous, Carles Garrigues. 127-132 [doi]
- A HTTP cookie covert channelWilliam Huba, Bo Yuan, Daryl Johnson, Peter Lutz. 133-136 [doi]
- Detour attack in OLSRManoj Singh Gaur, Vijay Laxmi, Manish Kumar, Rajbir Kaur. 137-142 [doi]
- Exploration of a hand-based graphical password schemeHaichang Gao, Licheng Ma, Jinhua Qiu, Xiyang Liu. 143-150 [doi]
- A sybil attack detection approach using neighboring vehicles in VANETJyoti Grover, Manoj Singh Gaur, Vijay Laxmi, Nitesh Kumar Prajapati. 151-158 [doi]
- Model checking security policy model using both UML static and dynamic diagramsLiang Cheng, Yang Zhang. 159-166 [doi]
- TW-KEAP: an efficient four-party key exchange protocol for end-to-end communicationsWei-Kuo Chiang, Jian-Hao Chen. 167-174 [doi]
- Secure random number generation in wireless sensor networksGiuseppe Lo Re, Fabrizio Milazzo, Marco Ortolani. 175-182 [doi]
- Improving operation time bounded mission critical systems' attack-survivability through controlled source-code transformationBogdan Korel, Shangping Ren, Kevin A. Kwiat, Arnaud Auguste, Alban Vignaux. 183-190 [doi]
- A different algebraic analysis of the ZUC stream cipherMufeed Juma AlMashrafi. 191-198 [doi]
- Algebraic analysis of the SSS stream cipherMufeed Juma AlMashrafi, Kenneth Koon-Ho Wong, Leonie Simpson, Harry Bartlett, Ed Dawson. 199-204 [doi]
- An approach to enhance the security of remote health monitoring systemsMahmoud Elkhodr, Seyed A. Shahrestani, Hon Cheung. 205-208 [doi]
- On the impacts of join and leave on the propagation ratio of topology-aware active wormsAhmad Jafarabadi, Mohammad Abdollahi Azgomi. 209-214 [doi]
- Different models of information protection system, based on the functional knapsackValeriy Osipyan. 215-218 [doi]
- Obscurity of network security course curriculumSuleyman Kondakci. 219-222 [doi]
- Counterfactually reasoning about securityManuel Peralta, Supratik Mukhopadhyay, Ramesh Bharadwaj. 223-226 [doi]
- Acceleration of packet filtering using gpgpuManoj Singh Gaur, Vijay Laxmi, Lakshminarayanan V., Kamal Cahndra, Mark Zwolinski. 227-230 [doi]
- Formal analysis of usage control policiesBoulares Ouchenne, Ousmane Koné. 231-234 [doi]
- Extending the Scope of cardspaceHaitham S. Al-Sinani, Chris J. Mitchell. 235-238 [doi]
- Towards hiding federated digital identity: stop-dissemination mechanism in content-centric networkingAmine Elabidi, Ghazi Ben Ayed, Sonia Mettali Gammar, Farouk Kamoun. 239-242 [doi]
- WinSEND: Windows SEcure Neighbor DiscoveryHosnieh Rafiee, Ahmad AlSa'deh, Christoph Meinel. 243-246 [doi]
- Research on survivability metrics based on survivable process of network systemLiang Ming, Minhuan Huang, Dongxia Wang, Xiaohui Kuang, Chunlei Wang, Xuewei Feng. 247-250 [doi]
- On the security and practicality of a buyer seller watermarking protocol for DRMGeong Sen Poh, Muhammad Reza Z'aba. 251-254 [doi]
- Proposal and implementation of enhanced HDD authentication that enables self-wipeZhaogong Guo, Kouichi Yasaki, Yousuke Nakamura, Kazuaki Nimura, Isamu Yamada. 255-258 [doi]
- Microcontroller-based implementation of parsekey+ for limited resources embedded applicationsAtilla Elçi, Behnam Rahnama, Reza Makvandi. 259-262 [doi]